edix / HiddenProcessDetectionLinks
Examples for detection of hidden processes on windows
☆35Updated 11 years ago
Alternatives and similar repositories for HiddenProcessDetection
Users that are interested in HiddenProcessDetection are comparing it to the libraries listed below
Sorting:
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Simple standalone bundle of NT core APIs☆25Updated 9 years ago
- Protect process fsfilter driver. Windows x64☆36Updated 9 years ago
- A-Protect Anti Rootkit Tool☆56Updated 12 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 13 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 9 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- A command line tool to load and unload a device driver.☆46Updated 8 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- Windows anti-rootkit library☆37Updated 10 years ago
- ☆34Updated 7 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Updated 12 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- just an lite AntiRootkit for interesting☆24Updated 10 years ago
- library, which help to describe or load and execute PE files.☆55Updated 12 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Updated 11 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 9 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Class implementation of PowerLoader injection technique☆32Updated 9 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Updated 11 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 10 years ago
- Windows kernel-mode callbacks tutorial driver☆48Updated 9 years ago
- MIR-Engine☆24Updated 8 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 11 years ago
- Anti-Anti-VM solution via Windows Driver☆62Updated 7 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Updated 10 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 14 years ago